Home SecurityHacking Addressing vulnerabilities in OT environments requires a Zero Trust approach